1FIREWALLD.ZONES(5)              firewalld.zones             FIREWALLD.ZONES(5)
2
3
4

NAME

6       firewalld.zones - firewalld zones
7

DESCRIPTION

9   What is a zone?
10       A network zone defines the level of trust for network connections. This
11       is a one to many relation, which means that a connection can only be
12       part of one zone, but a zone can be used for many network connections.
13
14       The zone defines the firewall features that are enabled in this zone:
15
16       Intra Zone Forwarding
17           Allows packets received by a zone to be forwarded to other
18           interfaces or sources within the same zone, even if the zone's
19           target is not ACCEPT.
20
21       Predefined services
22           A service is a combination of port and/or protocol entries.
23           Optionally netfilter helper modules can be added and also a IPv4
24           and IPv6 destination address.
25
26       Ports and protocols
27           Definition of tcp, udp, sctp or dccp ports, where ports can be a
28           single port or a port range.
29
30       ICMP blocks
31           Blocks selected Internet Control Message Protocol (ICMP) messages.
32           These messages are either information requests or created as a
33           reply to information requests or in error conditions.
34
35       ICMP block inversion
36           Changes how ICMP messages are handled. When enabled, all ICMP
37           message types are blocked, except for those in the ICMP block list.
38
39       Masquerading
40           The addresses of a private network are mapped to and hidden behind
41           a public IP address. This is a form of address translation.
42
43       Forward ports
44           A forward port is either mapped to the same port on another host or
45           to another port on the same host or to another port on another
46           host.
47
48       Rich language rules
49           The rich language extends the elements (service, port, icmp-block,
50           masquerade, forward-port and source-port) with additional source
51           and destination addresses, logging, actions and limits for logs and
52           actions. It can also be used for host or network white and black
53           listing (for more information, please have a look at
54           firewalld.richlanguage(5)).
55
56       For more information on the zone file format, please have a look at
57       firewalld.zone(5).
58
59   Which zones are available?
60       Here are the zones provided by firewalld sorted according to the
61       default trust level of the zones from untrusted to trusted:
62
63       drop
64           Any incoming network packets are dropped, there is no reply. Only
65           outgoing network connections are possible.
66
67       block
68           Any incoming network connections are rejected with an
69           icmp-host-prohibited message for IPv4 and icmp6-adm-prohibited for
70           IPv6. Only network connections initiated within this system are
71           possible.
72
73       public
74           For use in public areas. You do not trust the other computers on
75           networks to not harm your computer. Only selected incoming
76           connections are accepted.
77
78       external
79           For use on external networks with masquerading enabled especially
80           for routers. You do not trust the other computers on networks to
81           not harm your computer. Only selected incoming connections are
82           accepted.
83
84       dmz
85           For computers in your demilitarized zone that are
86           publicly-accessible with limited access to your internal network.
87           Only selected incoming connections are accepted.
88
89       work
90           For use in work areas. You mostly trust the other computers on
91           networks to not harm your computer. Only selected incoming
92           connections are accepted.
93
94       home
95           For use in home areas. You mostly trust the other computers on
96           networks to not harm your computer. Only selected incoming
97           connections are accepted.
98
99       internal
100           For use on internal networks. You mostly trust the other computers
101           on the networks to not harm your computer. Only selected incoming
102           connections are accepted.
103
104       trusted
105           All network connections are accepted.
106
107   Which zone should be used?
108       A public WIFI network connection for example should be mainly
109       untrusted, a wired home network connection should be fairly trusted.
110       Select the zone that best matches the network you are using.
111
112   How to configure or add zones?
113       To configure or add zones you can either use one of the firewalld
114       interfaces to handle and change the configuration: These are the
115       graphical configuration tool firewall-config, the command line tool
116       firewall-cmd or the D-Bus interface. Or you can create or copy a zone
117       file in one of the configuration directories.  /usr/lib/firewalld/zones
118       is used for default and fallback configurations and
119       /etc/firewalld/zones is used for user created and customized
120       configuration files.
121
122   How to set or change a zone for a connection?
123       The zone is stored into the ifcfg of the connection with ZONE= option.
124       If the option is missing or empty, the default zone set in firewalld is
125       used.
126
127       If the connection is controlled by NetworkManager, you can also use
128       nm-connection-editor to change the zone.
129
130       For the addition or change of interfaces that are not under control of
131       NetworkManager: firewalld tries to change the ZONE setting in the ifcfg
132       file, if an ifcfg file exists that is using the interface.
133
134       Only for the removal of interfaces that are not under control of
135       NetworkManager: firewalld is not trying to change the ZONE setting in
136       the ifcfg file. This is needed to make sure that an ifdown of the
137       interface will not result in a reset of the zone setting to the default
138       zone. Only the zone binding is then removed in firewalld then.
139

SEE ALSO

141       firewall-applet(1), firewalld(1), firewall-cmd(1), firewall-config(1),
142       firewalld.conf(5), firewalld.direct(5), firewalld.dbus(5),
143       firewalld.icmptype(5), firewalld.lockdown-whitelist(5), firewall-
144       offline-cmd(1), firewalld.richlanguage(5), firewalld.service(5),
145       firewalld.zone(5), firewalld.zones(5), firewalld.policy(5),
146       firewalld.policies(5), firewalld.ipset(5), firewalld.helper(5)
147

NOTES

149       firewalld home page:
150           http://firewalld.org
151
152       More documentation with examples:
153           http://fedoraproject.org/wiki/FirewallD
154

AUTHORS

156       Thomas Woerner <twoerner@redhat.com>
157           Developer
158
159       Jiri Popelka <jpopelka@redhat.com>
160           Developer
161
162       Eric Garver <eric@garver.life>
163           Developer
164
165
166
167firewalld 1.3.4                                             FIREWALLD.ZONES(5)
Impressum